DXi Accent Technical Background

Transcription

1 TECHNOLOGY BRIEF NOTICE This Technology Brief contains information protected by copyright. Information in this Technology Brief is subject to change without notice and does not represent a commitment on the part of Quantum. Quantum assumes no liability for any inaccuracies that may be contained in this Technology Brief. Quantum makes no commitment to update or keep current this information in this document, and reserves the right to make changes to or discontinue this document and/or products without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose other than the purchaser s personal use, without the express written permission of Quantum.

3 TECHNOLOGY BRIEF INTRODUCTION DXi Accent is software that allows the Quantum DXi deduplication to be used in a collaborative or hybrid mode, moving a portion of the deduplication operations to a backup server so that only unique blocks are moved over the network to a target appliance. Use of DXi Accent can increase backup performance where network bandwidth is the limiting factor, and can extend duplication beyond the appliance in an integrated, easy-to-deploy, and cost-effective solutions set. DXi Accent is available as a standard feature on all current Quantum deduplication appliances for operation in environments using NetBackup or Backup Exec and the Symantec OpenStorage API (OST). This technical brief describes DXi Accent software, its mode of operation, general use cases, and considerations for deployment. BACKGROUND ON DEDUPLICATION Quantum s patented 1 deduplication system operates by segmenting a stream of data into variable-length blocks, identifying repeated blocks, then compressing and writing only the unique segments to a blockpool on disk. To identify repeated blocks in a transmitted stream, the data deduplication engine creates a digital signature like a fingerprint for each data segment, and it keeps an index of the signatures for each repository. The index provides the reference list used to determine whether blocks already exist in a repository, and it is used to determine which data segments need to be stored or copied during a replication operation. When a data deduplication system identifies a block it has processed before, instead of storing the block again, it inserts a pointer to the original block in the data set s metadata. If the same block shows up multiple times, multiple pointers to it are generated but only the new, unique blocks are written to the storage pool. HYBRID DEDUPLICATION BRIDGES GAP BETWEEN TARGET AND SOURCE-BASED ARCHITECTURES Most deduplication systems carry out the deduplication operation either on a dedicated target appliance or on a source server that is also executing the backup operation. For full target mode operation, all the data is transmitted to the device and the deduplication occurs in the dedicated system. Purpose-built appliances like Quantum s DXi-Series are designed with deduplication-specific features to optimize the process. In the case of the DXi appliances, these include tiers of different storage devices for data pools and indexes to allow very high-speed inline performance both for backup and for reads. In bandwidth-constrained environments, however, the requirement to move all data to the appliance can limit overall performance. In source-based deduplication, the deduplication occurs in software as part of the backup process, taking place either on the backup client at the time of initial backup or on a backup server. Full source-side deduplication can speed up backups where network bandwidth is the limiting factor because only unique data needs to be transmitted to the target device. The trade-off in source-based operation is that the shared backup hardware (the backup server or client) experiences a greatly increased load when it assumes the entire deduplication task this increased load can slow down the backup and any other functions for which the server is responsible. To minimize this performance impact, source-based systems typically use a fixed-block deduplication method. Fixed-block deduplication is less compute-intensive than the variableblock system used by most target based systems, so it slows down backups less, but this comes at a price. Variable-block is much more effective at reducing data, so in comparison fixed-block requires more storage to protect the same data, block pools are restricted in size, and unique-block replication is often not supported. The end result is greater cost and complexity vs. variable-block systems. 1. Quantum s deduplication technology is protected by Pending and Issued U.S. and Foreign Patent No. 5,990,810. 3

4 DXi Accent is software from Quantum that enables a hybrid or collaborative approach to deduplication, combining the best features of both target and source-based systems. DXi Accent uses variable-length deduplication for the most effective data reduction, and it takes advantage of purpose-built DXi appliances for scalability, performance, and ease of integration, but it moves a portion of the deduplication process to the backup server so that only unique blocks are transmitted to the target appliance. This system, which leverages much of the underlying functionality of the DXi replication, allows DXi Accent to accelerate backups where network bandwidth is the limiting factor while limiting the impact on the backup server and maintaining DXi features that integrate deduplication effectively into the larger data protection environment. The performance gains in a particular customer environment vary with the amount of unique data in the data set and the nature of the bandwidth restrictions. For example, for a backup where 10% of the blocks are new, the potential effective transmission rate will be approximately 10 times more than when using a target-based approach alone. In general, DXi Accent does not increase the overall backup performance of DXi appliances for situations in which network bandwidth is not the constraining factor. HIGHER PERFORMANCE, BANDWIDTH SAVINGS, MINIMIZING IMPACT ON THE BACKUP SERVER With DXi Accent, the backup server collaborates in the deduplication process by carrying out the initial deduplication phases, specifically: 1) Dividing the stream of data into variable-length blocks and computing the signature for each one, 2) Collaborating with the DXi to identify the new unique blocks, and 3) Compressing the new unique blocks and transmitting them to the DXi appliance for storage in the blockpool. In order to determine the unique blocks, the signatures for all the blocks are sent by the server to the DXi appliance. The DXi compares the signatures to its central index and returns to the backup server a list of signatures for the unique blocks not already present in the blockpool. The backup server compresses these blocks and transmits them to the DXi to be stored. For blocks already present in the blockpool, the DXi simply stores a pointer to the existing block. This division of tasks between the backup server and DXi maximizes end-toend performance while minimizing loading effects on the backup server because it leaves most of the processor-intensive tasks on the appliance, including index comparisons, data integrity verification, disk I/O, direct write to tape, remote replication, space reclamation, and blockpool maintenance. As a result, the backup server requirements for DXi Accent are significantly lower than for traditional source-based architectures, and much more data can be protected with the same resources. (Figure 1) Figure 1. All data Blocks Segmented Signatures Generated Unique blocks Unique Data Compressed All data Network Connection Blocks Segmented Signatures Generated Index checked Index checked Unique blocks Index Index Unique Data Compressed Replication Replication Blockpool Blockpool Data written to disk Path-to-Tape Data written to disk Path-to-Tape DXi Appliance, Target Mode DXi Appliance, Hybrid Mode 4

5 TECHNOLOGY BRIEF USE CASES FOR DXi ACCENT AND HYBRID DEDUPLICATION There are three primary use cases for DXi Accent: 1) Local servers on congested LANs, 2) Virtual server environments, and 3) Remote servers where WAN bandwidth and network latency are the limiting factors. Let s consider each of these scenarios in turn. For local servers on congested LANs, DXi Accent s hybrid mode can accelerate backups by overcoming bandwidth limitations. By only sending new unique blocks to the target, much less data traverses the LAN, minimizing the effects of congestion. Backups that took too long may now be completed in their allotted windows without investing in network upgrades, and LAN capacity is freed for other applications. Virtual server environments are nearly always network-constrained, often severely so. Every virtual machine (VM) has one or more virtual network interface cards (VNICs), all competing for host resources and sharing a small number of physical NICs. When using a Quantum DXi V-Series virtual appliance as a backup target, DXi Accent reduces congestion on the virtual networks just as it does with physical LANs. For the third case, where servers are connected to the DXi over a WAN, the benefits are potentially even greater. With a traditional target-based approach, a target device (such as a deduplication appliance or a local tape library) must be deployed at the remote site to accept data from backup servers located there. That target then either creates tapes, which are then moved off-site for DR protection, or in the case of a deduplication appliance, replicates the unique data to another target device at a second site. DXi Accent makes it possible to entirely eliminate the need to deploy a hardware target at the remote site by allowing users to deploy DXi Accent on the backup server and send the backup data directly to a remote DXi over the WAN, whether that DXi is hosted at another customer site or in the cloud with a service such as Quantum s Q-Cloud. Because DXi Accent is based on the same protocol used for DXi-to-DXi replication, it is exceedingly tolerant of the low bandwidth and high latency typical of WAN connections. This method has implications for the restore process (discussed below), but where it is a fit, it provides a low-cost alternative to traditional target deployment. CONSIDERATIONS FOR RESTORE, DR PROTECTION, AND LONG-TERM RETENTION Users of hybrid backup architectures need to keep in mind the implications of restore profiles, DR protection needs, and long-term retention requirements when planning deployments. Although they let users send more backup data than the network s bandwidth would otherwise allow, any hybrid deduplication system and many source-based systems will have a different profile for restores. With these systems, all the data needing recovery is sent back along the same path as the backup, not just the unique blocks that were transferred during the backup. This means that more data must traverse the LAN or WAN during recovery and the process is likely to take more time. Where single-file or limited restores are the primary use case, the impact on restores will be minimal. In situations where large-scale restores are the norm or fullserver recoveries must be accounted for, users need to understand the impact on restore times and plan accordingly. One of the advantages of using DXi appliances is that DR protection and long-term retention can both be provided without having to move large amounts of data back over the network to the backup server. For automated DR protection, DXi systems provide remote replication to send duplicate backup sets to remote DXis. This process leverages the same variable-block deduplication technology to minimize network bandwidth and overcome latency, and it provides an automated process for creating off-site copies for DR purposes that has no impact on the backup server or the link between the server and the appliance. For long-term retention, and as an alternative for DR protection, DXi systems provide an integrated, direct path-to-tape, allowing them to send full data sets over a high-speed Fibre Channel connection, bypassing the media server and the network link from the server to the appliance to create removable media in a directly attached tape library. Data on tape can be used for DR protection, for large-scale restores at a remote site, or for low-cost storage for data that needs to be maintained for extended periods. Application-aware replication and direct tape creation are provided for DXi Accent through Symantec NetBackup s OpenStorage (OST) interface on supported platforms. 5

6 MAXIMUM FLEXIBILITY Unlike typical source-based systems or other hybrid approaches, DXi Accent was designed to provide maximum flexibility to make distributed deduplication a practical part of extended backup environments. Its underlying transport protocol is designed for effective operation even in high-latency environments so it can support connections both to local servers over a LAN and also to remote servers over a WAN. The DXi appliance and DXi Accent software solution was designed to allow mixed operation hybrid mode operation can be enabled or disabled on a server-by-server basis allowing it to be deployed in a wide range of use cases and avoiding the downsides of an all-or-nothing solution. In addition, DXi Accent works with the DXi appliances to provide DR protection and low-cost, long-term retention through replication and the integration of DXi s direct path-to-tape. This combination of local and remote operation, server-by-server enablement, DR protection, and integrated long-term retention is an industry-unique combination. (Figure 2) Figure 2. Enabled Disabled WAN connection to remote site Local LAN connection Replication for DR DXi-Series Appliance with DXi Accent Enabled Direct Tape Creation Over FC for Long-Term Retention DXi Appliance Support Quantum Q-Cloud DXi Accent is supported in both NetBackup and Backup Exec OST environments but is designed to be extensible to other applications. For details on current application and platform support, visit ABOUT QUANTUM Quantum is a leading expert in scale-out storage, archive and data protection, providing solutions for sharing, preserving and accessing digital assets over the entire data lifecycle. From small businesses to major enterprises, more than 100,000 customers have trusted Quantum to address their most demanding data workflow challenges. With Quantum, customers can Be Certain they have the end-to-end storage foundation to maximize the value of their data by making it accessible whenever and wherever needed, retaining it indefinitely and reducing total cost and complexity. See how at Quantum Corporation. All rights reserved. Quantum, the Quantum logo, DXi, DXi Accent and Q-Cloud are either registered trademarks 6 or trademarks of Quantum Corporation and its affiliates in the United States and/or other countries. All other trademarks are the property of their respective owners. TB00017A-v04 July 2014

Backup and Recovery: The Benefits of Multiple Deduplication Policies NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change

3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and

WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

UNDERSTANDING DATA DEDUPLICATION Thomas Rivera SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

UNDERSTANDING DATA DEDUPLICATION Tom Sas Hewlett-Packard SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material

data protection appliance featuring deduplication to protect your unique data Just for a moment imagine your daily business from a different perspective We lift you up where you belong Forget the constraints

NetBackup Best Practice Using Tape Storage with Deduplicating Disk Storage This document looks at best practices around creating multiple copies of backups on a mixture of tape and deduplicating disk storage.

Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to

Managing the information that drives the enterprise STORAGE Buying Guide: DEDUPLICATION inside What you need to know about target data deduplication Special factors to consider One key difference among

TECHNOLOGY BRIEF Extended Data Life Management: Protecting Data Over Long Periods of Time NOTICE This Technology Brief may contain proprietary information protected by copyright. Information in this Technology

Demystifying Deduplication for Backup with the Dell DR4000 This Dell Technical White Paper explains how deduplication with the DR4000 can help your organization save time, space, and money. John Bassett

Beyond: Optimizing Gartner clients using deduplication for backups typically report seven times to 25 times the reductions (7:1 to 25:1) in the size of their data, and sometimes higher than 100:1 for file

EMC PERSPECTIVE An EMC Perspective on Data De-Duplication for Backup Abstract This paper explores the factors that are driving the need for de-duplication and the benefits of data de-duplication as a feature

White Paper Improving Backup Effectiveness and Cost-Efficiency with Deduplication By Lauren Whitehouse October, 2010 This ESG White Paper was commissioned by Fujitsu and is distributed under license from

SYSTEMS-AT-A-GLANCE KEY FEATURES & BENEFITS We are the only company to integrate disk, tape, and replication into a complete solution set for better near-term protection and more cost-effective long-term

SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE When you can do it simply, you can do it all. SYMANTEC NETBACKUP APPLIANCES Symantec understands the shifting needs of the data center and offers NetBackup

WHAT IS FALCONSTOR? FalconStor Optimized Backup and Deduplication is the industry s market-leading virtual tape and LAN-based deduplication solution, unmatched in performance and scalability. With virtual

D2D2T Backup Architectures and the Impact of Data De-duplication NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change

Symantec NetBackup 7.5 What s New and Version Comparison Matrix Solution Overview: Data Protection While backup takes many forms, recovery shouldn t. Symantec NetBackup with V-Ray technology is the single

Remote Backup & Replication Solution Guide When it comes to Storage we are the Solution 2 What is Remote Backup? Remote Backup is simply backing up data to a location other than an organisation s central

Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................

Eight Considerations for Evaluating Disk-Based Backup Solutions 1 Introduction The movement from tape-based to disk-based backup is well underway. Disk eliminates all the problems of tape backup. Backing

V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped

E-Guide Data deduplication in the modern data backup system Deduplication technology can save as much as 90% of the space in your data center. That s if you do everything right. When choosing an approach

Veritas NetBackup With and Within the Cloud: Protection and Performance in a Single Platform Content Highlights... 3 Cloud-enabled Backup and Recovery... 3 Integrating Veritas NetBackup with the Cloud....

DISK IMAGE BACKUP For Physical Servers VEMBU TECHNOLOGIES www.vembu.com Copyright Information Information in this document is subject to change without notice. The entire risk of the use or the results